Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the HashiCorp Security Automation Certification HCVA0-003 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam HCVA0-003 Premium Access

View all detail and faqs for the HCVA0-003 exam


466 Students Passed

85% Average Score

92% Same Questions
Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which of the following capabilities can be used when writing a Vault policy? (Select four)

Options:

A.

list

B.

deny

C.

apply

D.

root

E.

create

F.

write

Questions # 2:

Your organization has enabled the LDAP auth method on the path of corp-auth/. When you access the Vault UI, you cannot log in despite providing the correct credentials. Based on the screenshot below, what action should you take to log in?

Question # 2

Options:

A.

Select corp-auth from the dropdown list

B.

Enter the username as corp-auth/bryan.krausen

C.

Select More Options and enter the Mount path that LDAP was enabled on (corp-auth/)

D.

Change to the Namespace of corp-auth before trying to authenticate

Questions # 3:

Your organization audited an essential application and found it isn’t securely storing data. For added security, auditors recommended encrypting all data before storing it in a backend database, and the application server should not store encryption keys locally. Which secrets engine meets these requirements?

Options:

A.

PKI secrets engine

B.

SSH secrets engine

C.

Transit secrets engine

D.

Cubbyhole secrets engine

Questions # 4:

A MySQL server has been deployed on Google Cloud Platform (GCP) to support a legacy application. You want to generate dynamic credentials against this MySQL server rather than use static credentials. What Vault secrets engine would you use to accomplish this?

Options:

A.

The GCP secrets engine

B.

The Identity secrets engine

C.

The database secrets engine

D.

The Cubbyhole secrets engine

Questions # 5:

You have logged into the Vault UI and see this screen. What Vault component is being enabled in the screenshot below?

Question # 5

Options:

A.

Storage Backends

B.

Secrets Engine

C.

Auth Methods

D.

Audit Devices

Questions # 6:

Which of the following are considered benefits of using policies in Vault? (Select three)

Options:

A.

Policies are assigned to a token on a 1:1 basis to eliminate conflicting policies

B.

Provides granular access control to paths within Vault

C.

Policies have an implicit deny, meaning that policies are deny by default

D.

Policies provide Vault operators with role-based access control

Questions # 7:

You are planning the deployment of your first Vault cluster and have decided to use Integrated Storage as the storage backend. Where do you configure the storage backend to be used by Vault?

Options:

A.

In the systemd service file

B.

Inside the Vault service once Vault is up and running

C.

In the Vault configuration file

D.

In the Vault Agent sink file

Questions # 8:

There are a few ways in Vault that can be used to obtain a root token. Select the valid methods from the answers below. (Select three)

Options:

A.

Generating a root token using a quorum of recovery keys when using Vault auto unseal

B.

Initializing Vault when first creating the cluster by using vault operator init

C.

Using a batch DR operation token to create a new root token in the event of an emergency

D.

Running the command vault token create when using a valid root token

Questions # 9:

A security architect is designing a solution to address the "Secret Zero" problem for a Kubernetes-based application that needs to authenticate to HashiCorp Vault. Which approach correctly leverages Vault features to solve this challenge?

Options:

A.

Store the Vault root token in a ConfigMap and mount it to all containers that require access to sensitive information

B.

Generate a long-lived token during deployment and store it as an environment variable within each container that needs to access Vault

C.

Configure the Kubernetes auth method in Vault and enable applications to authenticate without pre-shared secrets

D.

Implement a custom sidecar container that uses AppRole role-id and secret-id each time the application needs to access Vault

Questions # 10:

A developer has requested access to manage secrets at the path kv/apps/webapp01. You create the policy below which gives them the proper access:

path "kv/apps/webapp01" {

capabilities = ["read", "create", "update", "list"]

}

However, when the developer logs in to the Vault UI, they see the following screenshot and cannot access the desired secret. Why can’t the developer see the secrets they need?

Question # 10

Options:

A.

The Vault UI isn’t enabled for the developer, therefore they will only see the default options

B.

The key/value secrets engine isn’t available in the Vault UI, therefore the developer should use a different Vault interface instead

C.

The policy doesn’t permit list access to the paths prior to the secret so the Vault UI doesn’t display the mount path

D.

The secrets are stored under the cubbyhole secrets engine, so the developer should browse to that secrets engine

Viewing page 1 out of 9 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.